This article goes over the process of creating an AWS Sandbox account. The primary goal for the sandbox is to… Read more
Category: Uncategorized
Metasploitable 3 (Linux) Walkthrough: An Exploitation Guide
The Metasploitable virtual machine is an intentionally vulnerable image designed for testing security tools and demonstrating common vulnerabilities. Version 3… Read more
An Innovative Phishing Style
A few weeks ago, I added one of the many scammers trying to phish people on Steam. Usually, I block… Read more
Linux (x86) Exploit Development Series
Amazing tutorials for linux exploit development!
Exploit Development: Stack Buffer Overflow – Bypass NX/DEP
In my previous blog post, I covered the development of a buffer overflow exploit for a simple vulnerable program with overflow… Read more
Exploit Development: Stack Buffer Overflow
A stack buffer overflow occurs when a program writes more data to the stack than what is allocated to the… Read more
Metasploitable 2 Walkthrough: An Exploitation Guide
Metasploitable 2 The Metasploitable virtual machine is an intentionally vulnerable version of Ubuntu Linux designed for testing security tools and… Read more
Metasploitable Walkthrough: An Exploitation Guide
Metasploitable Metasploitable is an Ubuntu 8.04 server install on a VMWare 6.5 image with a number of vulnerable packages included,… Read more
Penetration Testing with Kali Linux and the OSCP
Offensive Security, PWK and OSCP – A Review PWK and OSCP Penetration Testing with Kali Linux (PWK) is Offensive Security’s starter… Read more